> Date: Wed, 09 May 2007 17:34:27 -0400
> From: Richard Stallman <[EMAIL PROTECTED]>
> 
>     Can TC be used to enhance security if it's used with free 
>     software?
> 
> If you can do this without contributing to any tendency to 
> legitimize treacherous computing, then it is harmless.  But you must 
> MAKE SURE you don't contribute to such a tendency.  Don't leave it 
> to chance!

This is the important point. It's very easy to rationalise a purchase 
of hardware containing treacherous computing technology with the 
fallacious logic of "It's possible to conceive of a non-harmful use; 
therefore, it's not certain that this is harmful; therefore, I can 
dismiss any argument telling me I shouldn't buy this."

That faulty logic has been distressingly common in this thread.

-- 
 \        "The right to search for truth implies also a duty; one must |
  `\     not conceal any part of what one has recognized to be true."  |
_o__)                                               -- Albert Einstein |
Ben Finney <[EMAIL PROTECTED]>

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Discussion mailing list
[email protected]
https://mail.fsfeurope.org/mailman/listinfo/discussion

Reply via email to